Chp 4 IAM Flashcards

1
Q

FRR

A

False Rejection Rate (FRR)
The rate at which a legitimate user is incorrectly rejected by the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FAR

A

False Acceptance Rate (FAR)
The rate at which an unauthorized user is incorrectly accepted by the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CER

A

Crossover Error Rate (CER)
The point at which the rates of FRR and FAR are equal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FER

A

Failure to Enroll Rate (FER)
Failure to Enroll Rate (FER) refers to the percentage of instances where the system fails to create a template for a user during the enrollment process. This template is necessary for subsequent authentication attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FIDO

A

Fast Identity Online (FIDO)
is an open authentication standard that strengthens and simplifies two-factor authentication (2FA) by using specialized hardware devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

hard authentication token

A

also known as a hardware token, is a physical device used to authenticate a user’s identity. These tokens provide an additional layer of security by requiring something the user possesses in addition to something they know (e.g., a password).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

soft authentication token

A

also known as a software token, is a digital form of an authentication token that is typically implemented as an application or software on a user’s device (e.g., smartphone, tablet, or computer). Soft tokens provide a convenient way to implement two-factor authentication (2FA) without the need for physical hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attestation

A

the process of verifying the authenticity and integrity of a device or system.
Think “Trusted Platform Module computer chip to prove root of trust”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DAC

A

Discretionary Access Control (DAC) is a type of access control model where the owner of the resource (such as files or data) has the authority to determine who can access it. The owner decides which users are granted access to specific resources and what operations they can perform.
“It is also the easiest to compromise, as it is vulnerable to insider threats and abuse of compromised accounts.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MAC

A

Mandatory access control (MAC) is based on security clearance levels. For example, a user with Top Secret clearance could read data with Top Secret, Secret, and Confidential classification labels. A user with Secret clearance could access Secret and Confidential levels only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ABAC

A

Attribute-Based Access Control (ABAC)
access control model that makes decisions based on attributes of the user (subject),
User Attributes: Information about the user, such as role, department, clearance level, or location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RBAC

A

Role-based access control (RBAC) means that an organization defines its permission requirements in terms of the tasks that an employee or service must be able to perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SID

A

A user account is defined by a unique security identifier (SID) in Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GPOs

A

Group Policy Objects (GPOs) are a set of rules and configurations in Microsoft Windows environments used to manage and configure operating systems, applications, and user settings within an Active Directory (AD) infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PAM

A

Privileged access management (PAM) refers to policies, procedures, and technical controls to prevent compromise of privileged accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SAW

A

secure administrative workstation (SAW) is a computer with a very low attack surface running the minimum possible apps.

17
Q

JIT

A

Just-in-Time (JIT) Permissions is a security approach where elevated privileges for accounts are granted only when needed and for a limited time, rather than being assigned permanently at login.

18
Q

ZSP

A

Zero Standing Privileges (ZSP) is a security approach where no user or account has permanent elevated privileges. Instead, elevated access rights are granted only when needed and are revoked immediately after the task is completed.

19
Q

LSASS

A

Local Security Authority Subsystem Service (LSASS) is a critical Windows operating system process responsible for enforcing the security policy on the system. It handles various security-related tasks such as user authentication, password changes, and creation of access tokens.

20
Q

SAM

A

Security Accounts Manager (SAM) is a database in Windows operating systems that stores user accounts and security descriptors for users on the local computer.

21
Q

NTLM

A

NT LAN Manager (NTLM) is a suite of Microsoft security protocols intended to provide authentication, integrity, and confidentiality to users.

22
Q

LDAP

A

Lightweight Directory Access Protocol (LDAP) is a protocol used to access and manage directory information over a network. It is commonly used to authenticate and authorize users and manage user credentials in directory services.

23
Q

KDC

A

A Key Distribution Center (KDC) is a crucial component of the Kerberos authentication protocol. It is responsible for securely distributing cryptographic keys and authenticating users and services within a network.

24
Q

TGT

A

A Ticket Granting Ticket (TGT) is a special ticket issued by the Key Distribution Center (KDC) in the Kerberos authentication protocol. It allows users to obtain service tickets for accessing various services within a network without needing to repeatedly enter their credentials.

25
Q

TGS

A

The Ticket Granting Service (TGS) is a component of the Key Distribution Center (KDC) in the Kerberos authentication protocol. It issues service tickets that allow clients to access specific services within the network.

26
Q

TGS session key

A

—communicates between the client and the Ticket Granting Service (TGS). This is encrypted using a hash of the user’s password.

27
Q

Federation

A

Federation refers to a system where different organizations or networks trust each other’s authentication mechanisms. This allows users from one network (such as partners, suppliers, or customers) to access resources on another network without needing a separate set of credentials.

28
Q

IdP

A

identity provider (IdP) In a federated network, the service that holds the user account and performs authentication.

29
Q

SAML

A

Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties

30
Q

SOAP

A

Simple Object Access Protocol (SOAP) is a protocol for exchanging structured information in the implementation of web services.

31
Q

REST

A

Many public clouds use application programming interfaces (APIs) based on Representational State Transfer (REST) rather than SOAP. A standardized, stateless architectural style used by web applications for communication and integration.

32
Q

OAuth

A

the Open Authorization (OAuth) protocol. OAuth is designed to facilitate sharing of information (resources) within a user profile between sites. Used for REST

33
Q

JWT

A

JSON Web Token (JWT) is used in OAuth for securely transmitting information, it is digitally signed. JWTs are commonly used for authentication and authorization in web applications.

34
Q

A company using Windows Server technology needs to link its Active Directory to a third-party service to allow single sign-on. Which service that uses the standard X.500 would work for the company?

A.Virtual Private Network
B.Lightweight Directory Access Protocol
C.Application Programming Interface
D.Local Security Authority Subsystem Service

A

B
Lightweight Directory Access Protocol (LDAP) is a protocol companies use for accessing network directory databases. LDAP stores information about authorized users, their privileges, and other organizational information.

35
Q

A company wants to set up single sign-on (SSO) without passing credentials through to each piece of software and cloud service. Which protocol would meet this requirement?

A.Kerberos
B.Fast IDentity Online
C.Virtual Private Network
D.Open Authorization

A

D
The Open Authorization (OAuth) protocol is a system that facilitates the sharing of information (resources) within a user profile between sites. OAuth can be used to implement SSO by allowing users to log in once and access multiple applications without passing credentials through to each piece of software. OAuth can be integrated with other mechanisms to provide SSO capabilities and also supports OpenID Connect (OIDC) tokens to enhance identity verification when needed.

36
Q

During a recent audit, a company noticed a troubling trend where people had their passwords on sticky notes in their work area. The employees stated that the password policy made it too difficult to remember them. Which policy should the company change to alleviate this issue?

A.Password complexity
B.Password reuse
C.Password history
D.Password management

A

A
Modifying the password complexity policy to allow for longer but easily remembered passwords can aid in lowering the number of people saving their passwords insecurely.

37
Q

An engineering firm wants to implement an authentication design that uses a framework for passwordless authentication. What statement is not accurate regarding passwordless authentication?

A.The user chooses either a roaming authenticator, such as a security key, or a platform authenticator implemented by the device OS.
B.The relying party uses a private key to verify the signature and authenticate the account session.
C.The user registers with a web application or service, referred to as a relying party.
D.When presented with an authentication challenge, the user performs the local gesture to unlock the private key.

A

B
To the contrary, part of the passwordless authentication framework involves the relying party to use the public key, not private, to verify the signature and authenticate the account session.

38
Q

A manufacturing company recently bought out another similar company. They need to link each company’s directory systems together to access their resources without merging the two. How can they link the two directory systems together?

A.Site-to-site VPN
B.Migration
C.Federation
D.Location-based restrictions

A

C
Federation directories allow two different subsets of accounts to work together for permissions and access.